New threats subverting digital signature validation

  • Published in

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50...

Read More

Temporary workers still require adequate data protection training, warns ICO

  • Published in

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More


Fighting evolving targeted attacks

  • Published in

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec Messaging Gateway, network threat protection for Mac.

Read More

Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and Information Technology Center (ZIVIT), the internal IT service provider for the Federal Revenue Administration and other federal authorities in Germany. The framework agreements are multi-year deals with a volume of up to 4,840 man-months.

Read More

Splunk turns to Ping Identity

  • Published in

Splunk has selected Ping Identity to provide its customers with simple and secure access to the Splunk customer portal.

Read More

Ping Identity has released PingCloud Private Tenant, a private cloud identity solution for the...
IT Governance, the global leader in information security, IT governance, risk management and...
A new industry study has revealed that a shocking 46 per cent of IT managers are not aware of PBX...
Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...
Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.
HP urges businesses to protect the endpoint - new report highlights that the enterprise has become...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more